default search action
Yuliang Zheng 0001
Person information
- affiliation: University of Alabama at Birmingham, AB, USA
- affiliation (former): University of North Carolina at Charlotte, NC, USA
- affiliation (former): Monash University, Melbourne, VIC, Australia
- affiliation (former): University of Wollongong , NSW, Australia
Other persons with the same name
- Yuliang Zheng 0002 — TU Darmstadt, Institute for Microwave Engineering and Photonics, Germany
- Yuliang Zheng 0003 — Guangdong University of Technology, School of Computer Science and Technology, Guangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c100]Shawn C. Adams, Yuliang Zheng:
A Blockchain Design Supporting Verifiable Reputation-based Selection of Committee Members and IPFS for Storage. ICSA-C 2023: 200-208 - 2021
- [c99]Shawn C. Adams, Yuliang Zheng:
FAWAC: An Attack-Resistant, Multi-Enclave Distributed Ledger Architecture. BRAINS 2021: 35-36 - 2020
- [c98]Ragib Hasan, Yuliang Zheng, Jeffery T. Walker:
Digital Forensics Education Modules for Judicial Officials. NCS 2020: 46-60
2010 – 2019
- 2018
- [c97]Puwen Wei, Quan Yuan, Yuliang Zheng:
Security of the Blockchain Against Long Delay Attack. ASIACRYPT (3) 2018: 250-275 - [i9]Puwen Wei, Quan Yuan, Yuliang Zheng:
Security of the Blockchain against Long Delay Attack. IACR Cryptol. ePrint Arch. 2018: 800 (2018) - 2015
- [j36]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER Block Cipher Family. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(3): 843-852 (2015) - [j35]Puwen Wei, Yuliang Zheng:
On the Construction of Public Key Encryption with Sender Recovery. Int. J. Found. Comput. Sci. 26(1): 1-32 (2015) - [j34]Graham Enos, Yuliang Zheng:
An ID-based signcryption scheme with compartmented secret sharing for unsigncryption. Inf. Process. Lett. 115(2): 128-133 (2015) - 2014
- [j33]Jia Fan, Yuliang Zheng, Xiaohu Tang:
A New Construction of Identity-Based Signcryption without Random Oracles. Int. J. Found. Comput. Sci. 25(1): 1-24 (2014) - [c96]Puwen Wei, Yuliang Zheng, Wei Wang:
Multi-recipient Encryption in Heterogeneous Setting. ISPEC 2014: 462-480 - 2013
- [j32]Jia Fan, Yuliang Zheng, Xiaohu Tang:
Key-Insulated Signcryption. J. Univers. Comput. Sci. 19(10): 1351-1374 (2013) - [c95]Yuliang Zheng:
Public Key Cryptography for Mobile Cloud. ACISP 2013: 435 - 2012
- [j31]Puwen Wei, Xiaoyun Wang, Yuliang Zheng:
Public key encryption without random oracle made truly practical. Comput. Electr. Eng. 38(4): 975-985 (2012) - [c94]Puwen Wei, Yuliang Zheng, Xiaoyun Wang:
Public Key Encryption for the Forgetful. Cryptography and Security 2012: 185-206 - [c93]Puwen Wei, Yuliang Zheng:
Efficient Public Key Encryption Admitting Decryption by Sender. EuroPKI 2012: 37-52 - [c92]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER + and SAFER + +. ICISC 2012: 170-183 - [i8]Graham Enos, Yuliang Zheng:
An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption. IACR Cryptol. ePrint Arch. 2012: 528 (2012) - [i7]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER+ and SAFER++. IACR Cryptol. ePrint Arch. 2012: 715 (2012) - 2011
- [c91]Jia Fan, Yuliang Zheng, Xiaohu Tang:
A Single Key Pair is Adequate for the Zheng Signcryption. ACISP 2011: 371-388 - [i6]Puwen Wei, Yuliang Zheng, Xiaoyun Wang:
Public Key Encryption for the Forgetful. IACR Cryptol. ePrint Arch. 2011: 197 (2011) - 2010
- [j30]Jia Fan, Yuliang Zheng, Xiaohu Tang:
Signcryption with Non-interactive Non-repudiation without Random Oracles. Trans. Comput. Sci. 10: 202-230 (2010) - [p2]Yuliang Zheng:
Introduction. Practical Signcryption 2010: 1-18 - [e8]Alexander W. Dent, Yuliang Zheng:
Practical Signcryption. Information Security and Cryptography, Springer 2010, ISBN 978-3-540-89409-4 [contents] - [i5]Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng:
Skew-Frobenius map on twisted Edwards curve. IACR Cryptol. ePrint Arch. 2010: 5 (2010)
2000 – 2009
- 2009
- [c90]Puwen Wei, Xiaoyun Wang, Yuliang Zheng:
Public Key Encryption without Random Oracle Made Truly Practical. ICICS 2009: 107-120 - [p1]Yuliang Zheng:
Coded Modulation and the Arrival of Signcryption. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009: 17-27 - [i4]Mingqiang Wang, Puwen Wei, Haifeng Zhang, Yuliang Zheng:
Optimal pairing revisited. IACR Cryptol. ePrint Arch. 2009: 564 (2009) - 2008
- [j29]Hideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng:
Introduction to the Special Issue on Information Theoretic Security. IEEE Trans. Inf. Theory 54(6): 2405-2407 (2008) - 2007
- [j28]Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng:
Privacy Preserving Database Generation for Database Application Testing. Fundam. Informaticae 78(4): 595-612 (2007) - [j27]Joonsang Baek, Ron Steinfeld, Yuliang Zheng:
Formal Proofs for the Security of Signcryption. J. Cryptol. 20(2): 203-235 (2007) - 2006
- [c89]Xian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng:
On Algebraic Immunity and Annihilators. ICISC 2006: 65-80 - 2005
- [c88]Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng:
A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services. ICWE 2005: 191-196 - [c87]Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Zheng:
Privacy Aware Data Generation for Testing Database Applications. IDEAS 2005: 317-326 - [c86]Zhaoyu Liu, Dichao Peng, Yuliang Zheng, Jeffrey Liu:
Communication Protection in IP-based Video Surveillance Systems. ISM 2005: 69-78 - [c85]Xintao Wu, Yongge Wang, Yuliang Zheng:
Statistical Database Modeling for Privacy Preserving Database Generation. ISMIS 2005: 382-390 - [c84]Yuliang Zheng:
Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks. MADNES 2005: 117 - [c83]Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng:
Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 - [c82]Yuliang Zheng, Yongge Wang:
Efficient and provably secure ciphers for storage device block level encryption. StorageSS 2005: 103-107 - [i3]Neil Kauer, Tony Suarez, Yuliang Zheng:
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms. IACR Cryptol. ePrint Arch. 2005: 397 (2005) - 2004
- [j26]Ron Steinfeld, Yuliang Zheng:
On the Security of RSA with Primes Sharing Least-Significant Bits. Appl. Algebra Eng. Commun. Comput. 15(3-4): 179-200 (2004) - [j25]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Efficient Unconditionally Secure Digital Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 120-130 (2004) - [j24]Laurence Bull, David McG. Squire, Yuliang Zheng:
A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content. Int. J. Digit. Libr. 4(3): 208-222 (2004) - [j23]Yuliang Zheng, Xian-Mo Zhang:
The Generalized XOR Lemma. Theor. Comput. Sci. 329(1-3): 331-337 (2004) - [c81]Joonsang Baek, Yuliang Zheng:
Identity-Based Threshold Signature Scheme from the Bilinear Pairings. ITCC (1) 2004: 124-128 - [c80]Gautam Singaraju, Lawrence Teo, Yuliang Zheng:
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. IWIA 2004: 79-96 - [c79]Joonsang Baek, Yuliang Zheng:
Identity-Based Threshold Decryption. Public Key Cryptography 2004: 262-276 - [c78]Yongge Wang, Xintao Wu, Yuliang Zheng:
Privacy Preserving Data Generation for Database Application Performance Testing. TrustBus 2004: 142-151 - [e7]Kan Zhang, Yuliang Zheng:
Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings. Lecture Notes in Computer Science 3225, Springer 2004, ISBN 3-540-23208-7 [contents] - 2003
- [j22]Joonsang Baek, Yuliang Zheng:
Zheng and Seberry's public key encryption scheme revisited. Int. J. Inf. Sec. 2(1): 37-44 (2003) - [j21]Yuliang Zheng, Xian-Mo Zhang:
Connections among nonlinearity, avalanche and correlation immunity. Theor. Comput. Sci. 292(3): 697-710 (2003) - [c77]Laurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng:
Grouping Verifiable Content for Selective Disclosure. ACISP 2003: 1-12 - [c76]Seungjoo Kim, Masahiro Mambo, Yuliang Zheng:
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. CT-RSA 2003: 227-243 - [c75]Joonsang Baek, Yuliang Zheng:
Simple and efficient threshold cryptosystem from the Gap Diffie-Hellman group. GLOBECOM 2003: 1491-1495 - [c74]Yongge Wang, Yuliang Zheng, Bei-tseng Chu:
Efficient and Secure Storage Systems Based on Peer-to-Peer Systems. IC-AI 2003: 17-22 - [c73]Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn:
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. IWIA 2003: 73-88 - [c72]Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng:
Dynamic and risk-aware network access management. SACMAT 2003: 217-230 - [c71]Yongge Wang, Yuliang Zheng:
Fast and Secure Magnetic WORM Storage Systems. IEEE Security in Storage Workshop 2003: 11-19 - [c70]Xintao Wu, Yongge Wang, Yuliang Zheng:
Privacy preserving database application testing. WPES 2003: 118-128 - [i2]Joonsang Baek, Yuliang Zheng:
Identity-Based Threshold Decryption. IACR Cryptol. ePrint Arch. 2003: 164 (2003) - 2002
- [j20]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. Comput. J. 45(3): 293-303 (2002) - [j19]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
A Traitor Traceable Conference System with Dynamic Sender. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 167-174 (2002) - [c69]Ron Steinfeld, Joonsang Baek, Yuliang Zheng:
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. ACISP 2002: 241-256 - [c68]Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes. EUROCRYPT 2002: 434-449 - [c67]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Public Key Cryptography 2002: 64-79 - [c66]Joonsang Baek, Ron Steinfeld, Yuliang Zheng:
Formal Proofs for the Security of Signcryption. Public Key Cryptography 2002: 80-98 - [e6]Yuliang Zheng:
Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Lecture Notes in Computer Science 2501, Springer 2002, ISBN 3-540-00171-9 [contents] - [i1]Ron Steinfeld, Laurence Bull, Yuliang Zheng:
Content Extraction Signatures. IACR Cryptol. ePrint Arch. 2002: 16 (2002) - 2001
- [j18]Yuliang Zheng, Xian-Mo Zhang:
On plateaued functions. IEEE Trans. Inf. Theory 47(3): 1215-1223 (2001) - [c65]Khaled M. Khan, Jun Han, Yuliang Zheng:
A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. Australian Software Engineering Conference 2001: 117-126 - [c64]Ron Steinfeld, Yuliang Zheng:
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. CT-RSA 2001: 52-62 - [c63]Ron Steinfeld, Laurence Bull, Yuliang Zheng:
Content Extraction Signatures. ICISC 2001: 285-304 - [c62]Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMACC 2001: 114-127 - [c61]Yuliang Zheng:
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. Public Key Cryptography 2001: 48-63 - 2000
- [j17]Tim Ebringer, Peter Thorne, Yuliang Zheng:
Parasitic Authentication To Protect Your E-Wallet. Computer 33(10): 54-60 (2000) - [j16]Xian-Mo Zhang, Yuliang Zheng, Hideki Imai:
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. Des. Codes Cryptogr. 19(1): 45-63 (2000) - [j15]Yuliang Zheng, Xian-Mo Zhang:
The kth-Order Nonhomomorphicity of S-Boxes. J. Univers. Comput. Sci. 6(8): 830-848 (2000) - [c60]Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng:
High Performance Agile Crypto Modules. ACISP 2000: 74-88 - [c59]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Unconditionally Secure Digital Signature Schemes Admitting Transferability. ASIACRYPT 2000: 130-142 - [c58]Yuliang Zheng, Xian-Mo Zhang:
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. ASIACRYPT 2000: 470-482 - [c57]Khaled M. Khan, Jun Han, Yuliang Zheng:
Characterizing User Data Protection of Software Components. Australian Software Engineering Conference 2000: 3-12 - [c56]Tim Ebringer, Yuliang Zheng, Peter Thorne:
Parasitic Authentication. CARDIS 2000: 307-326 - [c55]Yuliang Zheng, Xian-Mo Zhang:
New Results on Correlation Immunity. ICISC 2000: 49-63 - [c54]Sung-Ming Yen, Yuliang Zheng:
Weighted One-Way Hash Chain and Its Applications. ISW 2000: 135-148 - [c53]Ron Steinfeld, Yuliang Zheng:
A Signcryption Scheme Based on Integer Factorization. ISW 2000: 308-322 - [c52]Yuliang Zheng, Xian-Mo Zhang:
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. Selected Areas in Cryptography 2000: 262-274 - [c51]Khaled M. Khan, Jun Han, Yuliang Zheng:
Security Characterization of Software Components and Their Composition. TOOLS (36) 2000: 240-249 - [e5]Hideki Imai, Yuliang Zheng:
Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings. Lecture Notes in Computer Science 1751, Springer 2000, ISBN 3-540-66967-1 [contents]
1990 – 1999
- 1999
- [j14]Yuliang Zheng, Xian-Mo Zhang, Hideki Imai:
Restriction, Terms and Nonlinearity of Boolean Functions. Theor. Comput. Sci. 226(1-2): 207-223 (1999) - [c50]Jussipekka Leiwo, Chandana Gamage, Yuliang Zheng:
Organizational Modeling for Efficient Specification of Information Security Requirements. ADBIS 1999: 247-260 - [c49]Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai:
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. ASIACRYPT 1999: 86-102 - [c48]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. ASIACRYPT 1999: 348-362 - [c47]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. ICICS 1999: 157-168 - [c46]Yuliang Zheng, Xian-Mo Zhang:
Plateaued Functions. ICICS 1999: 284-300 - [c45]Yuliang Zheng, Xian-Mo Zhang:
Relationships between Bent Functions and Complementary Plateaued Functions. ICISC 1999: 60-75 - [c44]Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng:
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. ICISC 1999: 120-131 - [c43]Khaled M. Khan, Jun Han, Yuliang Zheng:
Security Properties of Software Components. ISW 1999: 52-56 - [c42]Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng:
Digital Watermarking Robust Against JPEG Compression. ISW 1999: 167-190 - [c41]Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng:
Encrypted Message Authentication by Firewalls. Public Key Cryptography 1999: 69-81 - [c40]Yuliang Zheng, Xian-Mo Zhang:
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. Selected Areas in Cryptography 1999: 92-105 - [e4]Masahiro Mambo, Yuliang Zheng:
Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings. Lecture Notes in Computer Science 1729, Springer 1999, ISBN 3-540-66695-8 [contents] - [e3]Hideki Imai, Yuliang Zheng:
Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings. Lecture Notes in Computer Science 1560, Springer 1999, ISBN 3-540-65644-8 [contents] - 1998
- [j13]Yuliang Zheng, Hideki Imai:
How to Construct Efficient Signcryption Schemes on Elliptic Curves. Inf. Process. Lett. 68(5): 227-233 (1998) - [c39]Goichiro Hanaoka, Yuliang Zheng, Hideki Imai:
LITESET: A Light-Weight Secure Electronic Transaction Protocol. ACISP 1998: 215-226 - [c38]Yuliang Zheng, Xian-Mo Zhang:
The nonhomomorphicity of S-boxes. ICISC 1998: 131-145 - [c37]Yuliang Zheng, Hideki Imai:
Compact and Unforgeable Key Establishment over an ATM Network. INFOCOM 1998: 411-418 - [c36]Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai:
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Public Key Cryptography 1998: 217-233 - [c35]Xian-Mo Zhang, Yuliang Zheng:
The Nonhomomorphicity of Boolean Functions. Selected Areas in Cryptography 1998: 280-295 - [c34]Kanta Matsuura, Yuliang Zheng, Hideki Imai:
Compact and Flexible Resolution of CBT Multicast Key-Distribution. WWCA 1998: 190-205 - [e2]Hideki Imai, Yuliang Zheng:
Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings. Lecture Notes in Computer Science 1431, Springer 1998, ISBN 3-540-64693-0 [contents] - 1997
- [j12]Xian-Mo Zhang, Yuliang Zheng:
Cryptographically resilient functions. IEEE Trans. Inf. Theory 43(5): 1740-1747 (1997) - [c33]Jussipekka Leiwo, Yuliang Zheng:
A Method to Implement a Denial of Service Protection Base. ACISP 1997: 90-101 - [c32]Xian-Mo Zhang, Yuliang Zheng:
New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. ACISP 1997: 147-158 - [c31]Yuliang Zheng:
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). CRYPTO 1997: 165-179 - [c30]Yuliang Zheng:
The SPEED Cipher. Financial Cryptography 1997: 71-90 - [c29]Xian-Mo Zhang, Yuliang Zheng, Hideki Imai:
Duality of Boolean functions and its cryptographic significance. ICICS 1997: 159-169 - [c28]Jussipekka Leiwo, Yuliang Zheng:
A Framework for the Management of Information Security. ISW 1997: 232-245 - [c27]Yuliang Zheng:
Signcryption and Its Applications in Efficient Public Key Solutions. ISW 1997: 291-312 - [c26]Jussipekka Leiwo, Yuliang Zheng:
Layered Protection of Availability. PACIS 1997: 84 - [c25]Jussipekka Leiwo, Yuliang Zheng:
A formal model to aid documenting and harmonizing of information security requirements. SEC 1997: 25-38 - 1996
- [j11]